11 /
tcp
1741579575 | 2025-03-05T18:14:57.654005
13 /
tcp
1193556399 | 2025-03-24T03:10:16.587456
15 /
tcp
819727972 | 2025-03-15T06:03:31.428079
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21 /
tcp
-731285715 | 2025-03-10T14:06:37.959350
-2107996212 | 2025-03-23T08:36:54.214989
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
25 /
tcp
-1399940268 | 2025-03-08T16:28:57.433913
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-02-25T01:05:30.923322
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2046098166 | 2025-03-15T21:18:57.784992
HTTP/1.1 302 Found
X-Content-Ty
43 /
tcp
1308377066 | 2025-03-11T13:17:53.702306
53 /
tcp
-42462918 | 2025-02-24T16:54:21.367271
9
\x81\x05\x00\x01\x00\x00\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01
\x00\x06\x85\x00\x00\x01\x00\x01\x00\x01\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03\xc0\x00\x10\x00\x03\x00\x00\x00\x00\x00\x05\x04none\xc0\x00\x02\x00\x03\
79 /
tcp
-877598700 | 2025-03-18T04:52:10.098385
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\\x01\xc3\xbf\xc3\xbb\\x03\xc3\xbf\xc3\xbd\\x01\xc3\xbf\xc3\xbe\\x01Username:
1033655232 | 2025-03-24T01:08:20.872943
HTTP/1.1 301 Moved Permanently
Server: Tengine
Date: Mon, 24 Mar 2025 01:08:20 GMT
Content-Type: text/html
Content-Length: 239
Connection: keep-alive
Location: https://finplus.umeng.com/
EagleEye-TraceId: 2106d89d17427785007481158e224c
Timing-Allow-Origin: *
1713556628 | 2025-03-23T02:46:38.051936
HTTP/1.1 400 Bad Request
Server: Jdcloud-FE
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=20
102 /
tcp
1911457608 | 2025-03-06T16:01:54.456757
\x00[\x00\x00\x00\x00\x00\x00
111 /
tcp
1187188851 | 2025-03-11T22:19:04.486629
Portmap
Program Version Protocol Port
113 /
tcp
455076604 | 2025-03-19T06:19:38.763705
!\x07version\x04bind7 t{RPowerDNS Recursor 410
121 /
tcp
819727972 | 2025-03-14T02:47:32.985829
SSH-2.0-OpenSSH_7.4
Vulnerabilities
122 /
tcp
-904840257 | 2025-03-13T10:47:44.294428
572 Relay not authorized\r\n
135 /
tcp
1040118286 | 2025-03-22T08:43:51.701675
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: WIN-IG71DFESOT5\n IP2: 60.199.208.208\n IP3: 2001:0:2851:782c:38f3:5c2:c338:2f2f\n\nNTLMSSP:\nTarget_Name: WIN-IG71DFESOT5\nProduct_Version: 10.0.14393 Ntlm 15\nOS: Windows 10, Version 1607/Windows Server 2016, Version 1607\nNetBIOS_Domain_Name: WIN-IG71DFESOT5\nNetBIOS_Computer_Name: WIN-IG71DFESOT5\nDNS_Domain_Name: WIN-IG71DFESOT5\nDNS_Computer_Name: WIN-IG71DFESOT5\nSystem_Time: 2024-01-22 08:14:35 +0
175 /
tcp
1911457608 | 2025-03-04T07:22:50.847966
\x00[\x00\x00\x00\x00\x00\x00
179 /
tcp
-399606100 | 2025-03-04T01:04:20.968218
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
190 /
tcp
1615193817 | 2025-03-22T15:03:32.870967
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
195 /
tcp
-2031152423 | 2025-03-06T05:47:36.226772
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
221 /
tcp
-1626979812 | 2025-03-13T10:30:51.431613
220 Service ready for new user.
264 /
tcp
-1180827859 | 2025-03-24T06:30:07.375443
CheckPoint\nFirewall Host: SKIET_LIBS1_INT_FW_SG5400_1\nSmartCenter Host: SKIET_LIBS1_MGMT_FW_NGSM10..umxpwy\\x00\n
-1547976805 | 2025-03-04T22:20:45.436045
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
389 /
tcp
-1639129386 | 2025-03-22T04:05:29.750632
0%\\x02\\x01\\x01a \n\\x010\\x04\\x00\\x04\\x19anonymous bind disallowed
-1898805192 | 2025-03-24T05:12:46.367836
HTTP/1.1 302 Found
Date: Mon, 24 Mar 2025 05:12:45 GMT
Content-Type: text/html
Content-Length: 258
Connection: keep-alive
Server: Tengine
Location: http://err.taobao.com/error2.html
EagleEye-TraceId: 2106d8a417427931654747685ebeb0
Strict-Transport-Security: max-age=31536000
Timing-Allow-Origin: *
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:2f:d4:39:73:8f:e8:ad:57:00:e1:cb
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Feb 12 03:37:02 2025 GMT
Not After : Sep 4 00:00:00 2025 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=*.umeng.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:be:91:ad:2c:7a:a2:3c:7d:ea:cb:a5:fe:1c:ad:
08:b5:05:e5:42:ba:65:9e:ae:05:72:57:76:28:f7:
9e:23:9d:0b:e8:e8:a9:06:44:45:53:c4:e9:16:a5:
8a:af:04:a2:66:0a:ea:01:99:09:4c:6f:83:79:93:
d3:50:a4:83:d7
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:*.umeng.com, DNS:*.ads.umeng.com, DNS:*.cnzz.com, DNS:*.databank.umeng.com, DNS:*.dratio.com, DNS:*.http.cnzz.com, DNS:*.login.umeng.com, DNS:*.mobile.cnzz.com, DNS:*.mobmore.com, DNS:*.open.umeng.com, DNS:*.um1.cn, DNS:*.umeng.alibaba-inc.com, DNS:*.umengcloud.com, DNS:*.umsns.com, DNS:*.umtrack.com, DNS:*.umtrack0.com, DNS:*.umtrack1.com, DNS:*.umtrack2.com, DNS:*.umv0.com, DNS:*.umv5.com, DNS:*.upush.umeng.com, DNS:*.uyunad.com, DNS:*.whalecloud.com, DNS:*.wrating.com, DNS:*.www.umeng.com, DNS:um1.cn, DNS:umeng.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
AF:A4:88:48:1D:DB:9C:4E:56:4C:AB:D0:69:33:14:17:83:5D:65:C3
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : AF:18:1A:28:D6:8C:A3:E0:A9:8A:4C:9C:67:AB:09:F8:
BB:BC:22:BA:AE:BC:B1:38:A3:A1:9D:D3:F9:B6:03:0D
Timestamp : Feb 12 03:37:04.937 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:0C:FD:21:56:69:BC:26:C0:BF:00:23:3C:
06:CF:89:A3:6E:06:F5:67:DE:1C:F7:D8:32:05:E5:71:
CE:89:4E:E4:02:21:00:FD:A1:9E:83:4E:2A:89:D3:F5:
BD:A3:1A:76:81:25:56:A1:26:6C:1E:7C:66:EB:E7:54:
BE:06:60:B3:76:D8:37
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
Timestamp : Feb 12 03:37:05.197 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:49:31:52:E5:5E:FA:9F:70:62:97:BB:C5:
80:E3:3F:7C:3D:7D:44:96:A1:AF:69:B7:57:67:A8:84:
E1:0E:A5:DB:02:21:00:9F:73:D4:37:6E:64:B7:35:B3:
43:67:45:0B:A4:9A:62:91:42:B9:F7:58:77:E5:FE:DC:
A1:D5:04:94:3D:FF:4B
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
Timestamp : Feb 12 03:37:04.891 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:1B:9A:38:7C:57:7F:8D:3D:19:39:79:E6:
6C:F4:12:E5:EA:F4:94:98:6B:FF:39:BD:82:B8:66:35:
6C:12:F5:8F:02:21:00:D1:02:31:AA:6A:7B:86:FA:EA:
CF:16:D9:9B:40:48:C4:09:F7:93:C6:B7:15:BE:F6:64:
01:E7:B7:3E:F2:48:44
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
2f:a7:7d:f5:08:52:8f:4b:30:85:d0:9f:61:1b:da:89:d8:0c:
5f:76:7f:ca:f6:ae:f3:28:08:66:25:e7:f1:c5:c3:7e:db:4e:
58:2d:db:42:d7:40:8f:88:9d:01:4e:e3:08:8c:01:66:dc:33:
f4:aa:a7:da:65:89:9d:85:b2:7e:3a:dc:4e:03:1f:80:d0:eb:
5e:05:b0:55:f9:56:0b:ee:01:bb:b5:46:56:89:0b:ad:36:0f:
15:67:56:0e:86:2d:ad:e0:2d:8a:71:87:fb:0a:ba:3d:6d:91:
fe:1c:5c:f9:a9:01:a6:0b:f3:21:89:e8:9e:66:8d:1c:ef:28:
1f:d0:7e:71:1e:97:d9:22:77:91:22:54:df:6e:40:8b:12:89:
c2:67:fe:17:9a:d2:10:cf:10:de:fe:41:b6:8c:9c:e4:96:32:
7f:97:d6:86:a8:f6:4d:8f:b7:31:7e:5d:98:31:39:7f:a3:95:
8c:4a:1c:f8:7e:2c:68:78:8d:79:06:ee:89:95:e8:50:69:2f:
c7:d6:75:80:bb:28:ff:b7:9f:3c:0a:ef:72:06:04:c9:71:aa:
7e:d0:59:8c:97:61:6d:df:13:d8:80:05:9a:18:cf:77:f6:2a:
62:01:0a:81:60:49:b8:bf:30:81:61:a4:50:48:dd:80:1d:18:
00:33:21:57
444 /
tcp
-1730858130 | 2025-03-21T13:29:30.513646
RFB 003.008
VNC:
Protocol Version: 3.8
452 /
tcp
1911457608 | 2025-03-24T07:41:19.068617
\x00[\x00\x00\x00\x00\x00\x00
503 /
tcp
-891714208 | 2025-03-03T21:09:58.582764
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
513 /
tcp
669849225 | 2025-02-27T15:09:45.426721
SSH-98.60-SysaxSSH_81885..42\r\n
541 /
tcp
-269727450 | 2025-03-16T01:17:59.027110
\\x16\\x03\\x01\\x01K\\x01\\x00\\x01G\\x03\\x03\\xa1\\xb0\\xcf\\xc9\\xc2X\\x037P\\xe0\\x8d\\xd7\\x1d_N\\x87&\\xa7U.^\\x19_K\\x13\\xed\\xe9L|\n\\xec\\x9e -\\xc23\\x1e\\x94\\xb3\\xe6|\x0c\\xaco|\\xe1\xc6\xa5V\\xd0\\x1d\\xf7Uf<\\xabgV=)\\xf2\\x86\\xc4\\x18\x0c\\x00"\\x13\\x02\\x13\\x03\\x13\\x01\\x00k\\x00=\\xc00\\xc0,\\xc
-1128967010 | 2025-03-16T07:06:36.588921
HTTP/1.1 200 OK
Server: Server
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Permitted-Cross-Domain-Policies: none
X-Robots-Tag: noindex, nofollow, noarchive, nosnippet, nosnippet, notranslate, noimageindex
Content-Type: text/html; charset=utf-8
554 /
tcp
1167995424 | 2025-03-22T09:03:26.130247
RTSP/1.0 200 OK
Server: Server/1.0.0
CSeq: 1
Public: OPTIONS, DESCRIBE, SETUP, TEARDOWN, PLAY, GET_PARAMETER, SET_PARAMETER
593 /
tcp
1308377066 | 2025-03-23T21:10:01.235059
632 /
tcp
-904840257 | 2025-03-19T04:41:23.972866
572 Relay not authorized\r\n
-779815868 | 2025-03-17T07:48:43.558813
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 3-22247063-0 0NNN RT(1705912086824 114) q(-1 -1 -1 -1) r(0 -1) b1
1300162323 | 2025-03-17T11:28:27.944679
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
771 /
tcp
-1487943323 | 2025-02-27T09:30:28.614053
431 Unable to negotiate secure command connection.\r\n
785 /
tcp
-2096652808 | 2025-03-20T07:58:51.146182
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
789 /
tcp
819727972 | 2025-03-12T13:51:30.067685
SSH-2.0-OpenSSH_7.4
Vulnerabilities
943 /
tcp
165188539 | 2025-02-25T08:33:54.169451
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1718295362 | 2025-03-20T09:41:47.984964
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
993 /
tcp
1911457608 | 2025-03-09T05:58:03.342017
\x00[\x00\x00\x00\x00\x00\x00
994 /
tcp
1543809371 | 2025-03-03T22:16:23.185161
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
998 /
tcp
-1399940268 | 2025-03-21T08:05:58.924133
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
81614701 | 2025-02-27T18:14:00.933053
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
1025 /
tcp
897328069 | 2025-03-10T20:38:53.428732
220 mail.scott000.com ESMTP
1080 /
tcp
1362344524 | 2025-03-24T08:46:19.444458
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
-1013082686 | 2025-03-18T01:09:22.597024
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1153 /
tcp
1911457608 | 2025-03-10T15:00:29.648671
\x00[\x00\x00\x00\x00\x00\x00
1177 /
tcp
1741579575 | 2025-03-05T17:08:10.399725
1180 /
tcp
1911457608 | 2025-03-19T19:31:30.346538
\x00[\x00\x00\x00\x00\x00\x00
1207 /
tcp
-375604792 | 2025-03-19T20:15:42.759968
220 Microsoft FTP Service
1234 /
tcp
165188539 | 2025-03-19T13:10:55.404313
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1370 /
tcp
2098371729 | 2025-03-23T05:39:57.614704
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
1414 /
tcp
1911457608 | 2025-03-21T19:20:38.746105
\x00[\x00\x00\x00\x00\x00\x00
1433 /
tcp
-271790512 | 2025-03-05T23:07:44.065087
MSSQL Server\nVersion: 251660240 (0xf0007d0)\nSub-Build: 0\nEncryption:Not available
1457 /
tcp
1632932802 | 2025-02-24T21:01:32.722243
1515 /
tcp
104385780 | 2025-03-23T09:35:13.892505
1521 /
tcp
-805164506 | 2025-03-06T17:56:02.982056
1554 /
tcp
-2089734047 | 2025-02-26T01:43:46.409302
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1604 /
tcp
1842524259 | 2025-03-13T22:39:58.594071
1801 /
tcp
1266492139 | 2025-03-24T02:25:54.796235
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074q\\xc0\\x86\xd9\xb0\\xc1hG\\xbf\\xbd\\x9f\\x89tx%\\x8892d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
-288825733 | 2025-03-01T01:19:51.790833
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
1926 /
tcp
1544300041 | 2025-03-11T08:48:09.500018
SSH-25453-Cisco-3524665.35
1950 /
tcp
-1279886438 | 2025-03-16T23:25:07.481239
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
1960 /
tcp
-2096652808 | 2025-03-16T20:39:25.089397
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1966 /
tcp
1911457608 | 2025-03-05T18:57:33.989683
\x00[\x00\x00\x00\x00\x00\x00
1969 /
tcp
-1399940268 | 2025-03-06T08:59:51.661689
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1971 /
tcp
-42767839 | 2025-03-04T03:04:55.349068
RFB 005.000
VNC:
Protocol Version: 5.0
1973 /
tcp
1308377066 | 2025-03-18T06:29:14.103978
1988 /
tcp
-1399940268 | 2025-03-24T10:41:10.784729
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2000 /
tcp
-1032713145 | 2025-03-21T14:33:18.036336
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
1830697416 | 2025-03-24T01:46:43.054102
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
2008 /
tcp
1741579575 | 2025-03-11T19:12:48.793309
2018 /
tcp
-1899074860 | 2025-03-09T22:35:21.351833
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
2051 /
tcp
-1810987450 | 2025-03-08T11:40:13.864308
2054 /
tcp
-1327660293 | 2025-02-26T06:41:48.742153
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
2065 /
tcp
-42767839 | 2025-03-06T16:41:55.524363
RFB 005.000
VNC:
Protocol Version: 5.0
2067 /
tcp
819727972 | 2025-03-23T17:16:35.083083
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2081 /
tcp
-1105333987 | 2025-03-16T00:56:01.115979
2083 /
tcp
-1461540015 | 2025-03-23T21:30:04.233481
audio 0 RTP/AVP 18 4 3 8 0 101
a
2087 /
tcp
2098371729 | 2025-03-13T23:15:34.278590
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
2100 /
tcp
-1730858130 | 2025-03-21T02:07:37.615423
RFB 003.008
VNC:
Protocol Version: 3.8
141730637 | 2025-03-10T17:02:23.670365
HTTP/1.0 200 OK
Server: Proxy
2154 /
tcp
2087396567 | 2025-03-18T01:18:54.551317
kjnkjabhbanc283ubcsbhdc72
2181 /
tcp
-122096153 | 2025-03-22T18:12:34.420091
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
2195 /
tcp
-1399940268 | 2025-03-05T00:10:05.561525
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2209 /
tcp
45131230 | 2025-03-18T05:27:39.741776
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
2222 /
tcp
-1659353189 | 2025-03-24T07:12:10.420401
SSH-2.0-ssh-server\r\n\\x00\\x00\\x02\\x14\x0b\\x14\x0b\\xed\\x16\\xae\\x96\t\\xc5En\\xbd\\x1cgn\\xff\\xad\\xd7\\x00\\x00\\x00\\xbbcurve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group14-sha256,diffie-hellman-gr
1662205251 | 2025-03-24T00:17:53.250557
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2332 /
tcp
-1681927087 | 2025-03-07T13:09:14.279172
kjnkjabhbanc283ubcsbhdc72
2345 /
tcp
-1399940268 | 2025-03-16T10:36:07.641078
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2376 /
tcp
957278843 | 2025-03-04T19:59:46.500891
2404 /
tcp
-2089734047 | 2025-03-18T14:42:19.885494
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2433 /
tcp
455076604 | 2025-03-17T20:05:19.454599
!\x07version\x04bind7 t{RPowerDNS Recursor 410
2506 /
tcp
-1428621233 | 2025-02-26T18:36:00.011632
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
2551 /
tcp
1996932384 | 2025-02-25T12:56:03.384415
2628 /
tcp
-971970408 | 2025-03-20T11:48:14.321349
2761 /
tcp
-1730858130 | 2025-03-20T21:26:09.953391
RFB 003.008
VNC:
Protocol Version: 3.8
2762 /
tcp
-2089734047 | 2025-03-17T09:46:14.523902
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3001 /
tcp
-1733645023 | 2025-03-24T02:53:45.470183
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
3015 /
tcp
1574088840 | 2025-03-23T19:00:38.934643
">Application and Content Networking Software 3.9</a>)\n</BODY><
3021 /
tcp
-1996280214 | 2025-02-25T10:18:56.093035
809283431 | 2025-03-03T18:57:48.309378
HTTP/1.1 405 Method Not Allowed
Server: nginx/1.18.0 (Ubuntu)
Connection: keep-alive
access-control-allow-credentials: true
access-control-expose-headers: host, accept, connection
vary: Origin, Access-Control-Request-Method, Access-Control-Request-Headers
3048 /
tcp
-1730858130 | 2025-03-09T09:34:24.068717
RFB 003.008
VNC:
Protocol Version: 3.8
3050 /
tcp
1911457608 | 2025-03-08T16:31:43.944207
\x00[\x00\x00\x00\x00\x00\x00
3060 /
tcp
-345718689 | 2025-03-19T18:33:27.132000
3062 /
tcp
819727972 | 2025-03-18T06:22:45.360599
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3067 /
tcp
-903067560 | 2025-03-23T06:07:22.754800
\x00[\x13)\xc2\x81\x7f\x00\x00
3076 /
tcp
820958131 | 2025-03-08T14:29:28.850275
kjnkjabhbanc283ubcsbhdc72\x02
3102 /
tcp
-1611764932 | 2025-02-27T04:52:26.104544
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
-1839934832 | 2025-03-10T03:59:06.160355
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
3117 /
tcp
-1641514916 | 2025-03-23T21:19:55.139554
* OK Merak 1dFUa2 IMAP4rev1
3127 /
tcp
-1996280214 | 2025-03-22T12:11:46.239889
3151 /
tcp
-1399940268 | 2025-03-06T08:30:01.826100
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3158 /
tcp
819727972 | 2025-03-05T10:15:31.504841
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3162 /
tcp
-1428621233 | 2025-03-11T16:30:36.206926
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3164 /
tcp
1911457608 | 2025-02-25T21:59:07.798893
\x00[\x00\x00\x00\x00\x00\x00
3171 /
tcp
-358801646 | 2025-03-18T23:04:41.397949
3172 /
tcp
-801484042 | 2025-03-20T23:17:14.227317
3179 /
tcp
1911457608 | 2025-03-05T06:33:32.669555
\x00[\x00\x00\x00\x00\x00\x00
3195 /
tcp
-454087041 | 2025-03-15T08:27:49.192525
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
3256 /
tcp
2087396567 | 2025-03-14T17:05:39.274075
kjnkjabhbanc283ubcsbhdc72
3260 /
tcp
-862070606 | 2025-03-14T18:43:31.085991
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None\nTargetAlias=LIO Target\nTargetPortalGroupTag=1\n\n
-1547976805 | 2025-03-23T21:49:17.250659
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
3269 /
tcp
1126993057 | 2025-03-11T18:29:21.254719
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
3270 /
tcp
-653033013 | 2025-02-25T13:58:49.638529
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3299 /
tcp
1778988322 | 2025-03-13T01:40:07.085630
* OK GroupWise IMAP4rev1 Server Ready
3301 /
tcp
-1626979812 | 2025-03-24T00:40:50.141139
220 Service ready for new user.
3306 /
tcp
-1230509234 | 2025-03-23T14:46:14.029802
J\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3307 /
tcp
1911457608 | 2025-03-23T06:39:19.861335
\x00[\x00\x00\x00\x00\x00\x00
3310 /
tcp
-1733645023 | 2025-03-04T19:19:09.741145
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
3345 /
tcp
-1399940268 | 2025-03-17T22:30:52.888870
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3388 /
tcp
165188539 | 2025-03-22T11:28:59.438905
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3389 /
tcp
419073695 | 2025-03-12T04:11:44.983829
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x1f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: 172_19_32_23\nProduct_Version: 10.0.20348 Ntlm 15\nOS: Windows Server 2022\nNetBIOS_Domain_Name: 172_19_32_23\nNetBIOS_Computer_Name: 172_19_32_23\nDNS_Domain_Name: 172_19_32_23\nDNS_Computer_Name: 172_19_32_23\nSystem_Time: 2024-01-22 08:40:52 +0000 UTC\n\n
3390 /
tcp
-1888448627 | 2025-03-11T21:10:28.985647
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-03-18T01:30:55.594840
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
3402 /
tcp
-1399940268 | 2025-03-04T18:22:54.721826
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3403 /
tcp
-1399940268 | 2025-03-11T08:20:09.216912
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3530 /
tcp
921225407 | 2025-02-27T12:32:36.365839
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3549 /
tcp
-2140303521 | 2025-02-26T08:26:39.337136
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
198844676 | 2025-03-15T23:58:52.506395
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3552 /
tcp
-2017887953 | 2025-02-25T01:25:01.313790
SSH-2.0-OpenSSH_7.9
Vulnerabilities
3622 /
tcp
1381121983 | 2025-03-19T17:59:02.636048
3780 /
tcp
2087396567 | 2025-03-15T10:13:56.507851
kjnkjabhbanc283ubcsbhdc72
3841 /
tcp
-1648456501 | 2025-03-22T17:38:43.611130
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
3950 /
tcp
-1399940268 | 2025-03-16T10:44:37.073866
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3952 /
tcp
575925250 | 2025-02-26T17:43:21.422495
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
4022 /
tcp
1911457608 | 2025-03-19T23:42:09.636224
\x00[\x00\x00\x00\x00\x00\x00
114471724 | 2025-03-18T14:44:11.647981
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
4063 /
tcp
339872247 | 2025-03-24T03:48:21.182599
4064 /
tcp
321971019 | 2025-03-11T10:31:58.133180
-ERR client ip is not in whitelist\r
-1230049476 | 2025-03-10T07:41:58.975156
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
4150 /
tcp
1363464823 | 2025-03-12T20:42:39.218529
4157 /
tcp
2087396567 | 2025-02-22T22:30:42.745531
kjnkjabhbanc283ubcsbhdc72
4250 /
tcp
1353260875 | 2025-03-10T02:01:32.850691
\x00[g\xc2\x95N\x7f\x00\x00
4282 /
tcp
380146262 | 2025-03-11T23:30:57.326383
1282941221 | 2025-03-17T01:47:58.008465
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
4435 /
tcp
-801484042 | 2025-03-09T08:19:27.813945
1830697416 | 2025-02-25T23:54:28.589301
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
285437346 | 2025-03-21T15:31:41.182690
HTTP/1.1 200 OK
Content-Type: text/xml
X-Transcend-Version: 1
Strict-Transport-Security: max-age=31536000 ; includeSubDomains
X-Frame-Options: deny
X-Content-Type-Options: nosniff
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: no-referrer
Clear-Site-Data: "cache","cookies","storage"
Cross-Origin-Embedder-Policy: require-corp
Cross-Origin-Opener-Policy: same-origin
Cross-Origin-Resource-Policy: same-origin
X-XSS-Protection: 0
4444 /
tcp
-1888448627 | 2025-02-23T17:33:01.079998
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
4463 /
tcp
-585940771 | 2025-03-04T23:38:50.238482
4500 /
tcp
1011407350 | 2025-03-18T01:18:56.180407
* OK GroupWise IMAP4rev1 Server Ready\r\n
4506 /
tcp
819727972 | 2025-02-23T04:19:15.558481
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4510 /
tcp
-1399940268 | 2025-03-12T19:16:12.417500
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4520 /
tcp
669849225 | 2025-03-12T15:56:50.230766
SSH-98.60-SysaxSSH_81885..42\r\n
2143387245 | 2025-03-23T19:07:02.676318
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
4543 /
tcp
321971019 | 2025-03-16T12:27:43.998930
-ERR client ip is not in whitelist\r
4620 /
tcp
-1399940268 | 2025-03-12T04:59:11.117937
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4840 /
tcp
2098371729 | 2025-02-25T12:17:49.902271
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
4899 /
tcp
819727972 | 2025-03-05T12:39:45.940194
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4911 /
tcp
-784071826 | 2025-03-04T12:27:10.942730
SSH-2.0-OpenSSH_8.0
Vulnerabilities
4999 /
tcp
-1399940268 | 2025-03-12T23:02:17.280805
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5001 /
tcp
740837454 | 2025-03-18T17:56:02.670824
SSH-2.0-OpenSSH_5.3
Vulnerabilities
5006 /
tcp
-407828767 | 2025-02-25T06:28:34.256023
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
5007 /
tcp
-407828767 | 2025-03-20T09:08:20.041237
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
-1338936697 | 2025-03-13T00:32:24.449651
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2109_PStjdxtk16_38957-48596
5011 /
tcp
-653033013 | 2025-03-08T21:36:26.259000
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
5053 /
tcp
-1399940268 | 2025-03-13T17:13:50.920857
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5070 /
tcp
321971019 | 2025-03-20T02:32:05.666979
-ERR client ip is not in whitelist\r
5172 /
tcp
-1730858130 | 2025-03-15T00:33:54.916008
RFB 003.008
VNC:
Protocol Version: 3.8
5222 /
tcp
1690634669 | 2025-03-07T16:22:48.066544
5226 /
tcp
-1899074860 | 2025-02-22T20:41:28.923954
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
5255 /
tcp
-1329831334 | 2025-03-12T12:05:17.309864
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
5259 /
tcp
165188539 | 2025-03-24T00:58:14.584312
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5268 /
tcp
-1399940268 | 2025-03-19T04:51:41.115086
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1462885993 | 2025-03-15T16:54:12.086610
HTTP/1.1 400 Bad Request
Server: openresty
Content-Type: text/html
Connection: close
5321 /
tcp
-441419608 | 2025-03-09T08:44:43.682306
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
5503 /
tcp
-2089734047 | 2025-03-14T15:27:49.433462
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5630 /
tcp
-1399940268 | 2025-03-13T15:20:32.206549
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5672 /
tcp
575925250 | 2025-03-24T01:11:59.290010
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5696 /
tcp
-1641514916 | 2025-03-05T07:34:26.635728
* OK Merak 1dFUa2 IMAP4rev1
5858 /
tcp
2087396567 | 2025-02-26T21:13:14.405010
kjnkjabhbanc283ubcsbhdc72
5986 /
tcp
1492413928 | 2025-02-28T20:39:24.000246
SSH-2.0-OpenSSH_7.5
Vulnerabilities
5997 /
tcp
-1399940268 | 2025-03-14T16:17:14.198361
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5998 /
tcp
-1112332374 | 2025-03-10T00:15:34.357737
RFB 003.004
VNC:
Protocol Version: 3.4
6000 /
tcp
1504401647 | 2025-03-18T08:24:15.651008
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
6001 /
tcp
632542934 | 2025-03-11T18:26:42.375852
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
6352 /
tcp
1975288991 | 2025-02-27T08:21:33.327259
6488 /
tcp
-1032713145 | 2025-03-22T09:37:27.443657
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
6512 /
tcp
921225407 | 2025-03-23T03:40:14.017898
\x00\x00\x00\x04\x00\x00\x00\x00\x00
6561 /
tcp
-136006866 | 2025-02-24T04:27:43.067979
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
6633 /
tcp
-1730858130 | 2025-02-24T04:56:07.005938
RFB 003.008
VNC:
Protocol Version: 3.8
6653 /
tcp
-891714208 | 2025-03-19T01:49:14.509056
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
-1327849035 | 2025-03-13T04:35:08.116645
HTTP/1.1 200 OK
Server: Webs
X-Frame-Options: SAMEORIGIN
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=60, max=99
6667 /
tcp
2087396567 | 2025-03-16T16:28:25.923209
kjnkjabhbanc283ubcsbhdc72
6748 /
tcp
1492413928 | 2025-03-06T11:41:00.623327
SSH-2.0-OpenSSH_7.5
Vulnerabilities
-2098229858 | 2025-03-18T17:49:34.321797
HTTP/1.1 401 Unauthorized
Server: PDR-M800/1.0
Content-Type: text/plain
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: -1
Transfer-Encoding: chunked
Connection: Keep-Alive
-274925451 | 2025-03-18T18:53:51.975391
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2914_PSzqstdxnz35_3380-26211
7006 /
tcp
-1399940268 | 2025-02-27T08:59:48.444573
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7010 /
tcp
632542934 | 2025-03-16T06:02:20.166630
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
7011 /
tcp
-2089734047 | 2025-03-12T21:15:43.603062
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
7012 /
tcp
-1399940268 | 2025-03-20T22:29:36.997776
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7014 /
tcp
-2089734047 | 2025-03-22T07:25:11.621220
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
7081 /
tcp
1278527606 | 2025-02-28T14:23:20.625499
7085 /
tcp
-2033111675 | 2025-03-18T16:15:32.422325
7171 /
tcp
-441419608 | 2025-03-13T14:57:14.739650
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
7218 /
tcp
-1681927087 | 2025-03-17T02:10:14.757067
kjnkjabhbanc283ubcsbhdc72
7433 /
tcp
-1399940268 | 2025-03-22T09:58:45.043921
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7445 /
tcp
-1399940268 | 2025-03-04T03:34:22.264438
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7548 /
tcp
2087396567 | 2025-03-23T20:34:54.543861
kjnkjabhbanc283ubcsbhdc72
2103111368 | 2025-03-16T16:24:13.883389
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8009 /
tcp
-297128567 | 2025-03-17T20:31:40.653673
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
8015 /
tcp
1911457608 | 2025-03-24T10:18:42.629399
\x00[\x00\x00\x00\x00\x00\x00
8024 /
tcp
1911457608 | 2025-03-09T10:33:21.413593
\x00[\x00\x00\x00\x00\x00\x00
8027 /
tcp
1911457608 | 2025-03-13T01:57:00.313800
\x00[\x00\x00\x00\x00\x00\x00
8043 /
tcp
2098371729 | 2025-03-20T14:44:42.349855
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
8048 /
tcp
-2089734047 | 2025-03-04T05:18:49.568287
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8056 /
tcp
819727972 | 2025-03-18T19:06:10.257835
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8058 /
tcp
51259122 | 2025-03-03T20:03:50.210312
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
8062 /
tcp
819727972 | 2025-03-19T07:37:37.255613
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8065 /
tcp
-1888448627 | 2025-02-25T17:26:18.367357
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8081 /
tcp
2087396567 | 2025-03-09T09:14:53.000270
kjnkjabhbanc283ubcsbhdc72
8084 /
tcp
-1888448627 | 2025-03-19T17:38:48.545385
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8085 /
tcp
1741579575 | 2025-03-16T22:05:34.303107
8105 /
tcp
-1835475271 | 2025-03-22T05:02:58.727689
200 NOD32SS 99 (3318497116)\r\n
8106 /
tcp
-358801646 | 2025-03-10T07:39:56.126972
8111 /
tcp
-1399940268 | 2025-02-24T07:12:25.559181
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8114 /
tcp
-1888448627 | 2025-03-15T22:16:30.824314
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8120 /
tcp
819727972 | 2025-02-25T12:16:38.734523
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8126 /
tcp
740837454 | 2025-03-21T08:46:19.316559
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8132 /
tcp
1911457608 | 2025-03-17T07:57:14.911169
\x00[\x00\x00\x00\x00\x00\x00
8139 /
tcp
1690634669 | 2025-03-15T10:05:07.107480
8140 /
tcp
1741579575 | 2025-03-21T09:48:55.049442
8141 /
tcp
-1641514916 | 2025-03-05T16:25:16.465668
* OK Merak 1dFUa2 IMAP4rev1
8151 /
tcp
1911457608 | 2025-03-13T16:07:50.534102
\x00[\x00\x00\x00\x00\x00\x00
8156 /
tcp
-339084706 | 2025-03-04T08:22:28.134797
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
8159 /
tcp
-407828767 | 2025-03-13T00:37:17.626303
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
2103111368 | 2025-02-23T17:52:52.328399
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8181 /
tcp
819727972 | 2025-03-09T23:39:53.082752
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-03-24T02:32:22.337854
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8291 /
tcp
-1399940268 | 2025-03-21T17:00:19.222905
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8382 /
tcp
-616720387 | 2025-03-10T17:27:09.231265
8388 /
tcp
597764502 | 2025-03-15T22:26:05.605913
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
378148627 | 2025-03-23T05:04:24.087051
HTTP/1.1 497 Http to Https
Server: nginx/1.20.1
Content-Type: text/html; charset=utf-8
Connection: close
8403 /
tcp
321971019 | 2025-03-10T16:42:29.408382
-ERR client ip is not in whitelist\r
8422 /
tcp
205347087 | 2025-02-27T06:33:31.494634
SSH-25453-Cisco-3524665.35\n
8424 /
tcp
-1730858130 | 2025-02-28T15:35:22.062081
RFB 003.008
VNC:
Protocol Version: 3.8
8433 /
tcp
-1399940268 | 2025-03-18T18:20:17.238099
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-278036674 | 2025-03-05T06:27:12.543016
HTTP/1.1 303 See Other
Server: sw-cp-server
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Expires: Fri, 28 May 1999 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Location: https://61.219.16.212:8443/login.php?success_redirect_url=%2F
8449 /
tcp
1762042191 | 2025-03-16T16:53:10.926878
8450 /
tcp
1492413928 | 2025-03-04T23:17:10.679043
SSH-2.0-OpenSSH_7.5
Vulnerabilities
8488 /
tcp
632542934 | 2025-02-23T13:48:18.357399
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8514 /
tcp
-1733106930 | 2025-03-14T21:50:30.099442
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
8524 /
tcp
-345718689 | 2025-03-20T06:07:23.924153
8545 /
tcp
-1399940268 | 2025-03-20T22:14:22.071778
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8554 /
tcp
819727972 | 2025-03-09T18:30:06.597098
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8575 /
tcp
-1730858130 | 2025-03-06T16:55:24.606182
RFB 003.008
VNC:
Protocol Version: 3.8
8582 /
tcp
-1399940268 | 2025-02-25T21:17:41.051452
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8583 /
tcp
-1888448627 | 2025-02-25T09:34:23.161699
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1830697416 | 2025-03-24T10:01:05.777944
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
8592 /
tcp
921225407 | 2025-03-14T17:55:50.968390
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8649 /
tcp
842535728 | 2025-03-19T12:00:12.771592
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
8705 /
tcp
740837454 | 2025-02-27T19:30:32.377828
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8728 /
tcp
1911457608 | 2025-03-11T06:22:33.631915
\x00[\x00\x00\x00\x00\x00\x00
8732 /
tcp
1911457608 | 2025-03-23T12:10:02.827187
\x00[\x00\x00\x00\x00\x00\x00
8764 /
tcp
-358801646 | 2025-03-18T20:24:21.657816
8834 /
tcp
2087396567 | 2025-03-21T00:08:01.448138
kjnkjabhbanc283ubcsbhdc72
8838 /
tcp
-1598265216 | 2025-03-20T20:18:54.081391
8840 /
tcp
1911457608 | 2025-02-25T18:23:50.883903
\x00[\x00\x00\x00\x00\x00\x00
8841 /
tcp
-122096153 | 2025-03-10T05:24:58.432887
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
8852 /
tcp
-122096153 | 2025-03-04T22:46:26.442545
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
8862 /
tcp
-457235091 | 2025-03-18T02:24:04.029304
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
8869 /
tcp
1363464823 | 2025-03-09T12:10:21.192645
8872 /
tcp
-1329831334 | 2025-03-20T03:17:56.506502
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
8880 /
tcp
1690634669 | 2025-03-13T18:15:56.209019
8881 /
tcp
-1399940268 | 2025-02-24T13:50:27.642261
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8889 /
tcp
-79865617 | 2025-03-23T11:48:53.784375
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
372433470 | 2025-03-15T16:51:12.232836
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8905 /
tcp
-445721795 | 2025-03-15T08:53:20.134659
\x00[\xc3\xaed\x1a\x7f\x00\x00
8910 /
tcp
321971019 | 2025-03-14T10:43:16.425152
-ERR client ip is not in whitelist\r
8988 /
tcp
1574088840 | 2025-02-27T15:44:56.223274
">Application and Content Networking Software 3.9</a>)\n</BODY><
1966849516 | 2025-02-25T02:35:25.456718
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65adecfe_CS-000-01NFs233_3728-19750
9001 /
tcp
-1026951088 | 2025-03-19T10:33:48.140658
9004 /
tcp
321971019 | 2025-03-10T16:40:07.914751
-ERR client ip is not in whitelist\r
9007 /
tcp
-1428621233 | 2025-02-23T19:37:05.149049
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
9011 /
tcp
722711397 | 2025-03-23T06:19:32.812768
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
9059 /
tcp
-1476017887 | 2025-02-25T17:45:42.095407
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
9060 /
tcp
-1105333987 | 2025-02-27T09:33:14.744361
9070 /
tcp
1989907056 | 2025-02-25T06:36:12.037871
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
9075 /
tcp
-1327660293 | 2025-03-23T15:08:09.053394
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9083 /
tcp
-1598265216 | 2025-03-14T23:25:21.361049
9086 /
tcp
-441419608 | 2025-03-13T12:38:34.325083
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
9091 /
tcp
-1729629024 | 2025-02-24T15:32:29.082759
9095 /
tcp
-2017887953 | 2025-03-15T06:38:11.061241
SSH-2.0-OpenSSH_7.9
Vulnerabilities
9098 /
tcp
-2031152423 | 2025-03-20T12:20:52.615928
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
9101 /
tcp
-2089734047 | 2025-03-09T06:03:43.391362
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9112 /
tcp
-1399940268 | 2025-03-14T15:09:27.406551
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9113 /
tcp
401555314 | 2025-02-25T00:05:54.112384
9116 /
tcp
-2089734047 | 2025-02-26T14:14:24.888088
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9148 /
tcp
-1399940268 | 2025-03-07T02:13:37.122846
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9151 /
tcp
1911457608 | 2025-03-09T21:57:10.991352
\x00[\x00\x00\x00\x00\x00\x00
9155 /
tcp
-1399940268 | 2025-03-09T21:24:41.876728
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9157 /
tcp
1991883981 | 2025-03-08T18:05:59.974384
B\x00\x00\x00\xc3\xbfn\x04Too many connections
1282941221 | 2025-03-04T19:17:56.383415
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9165 /
tcp
-1265999252 | 2025-03-09T08:27:39.122095
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
9185 /
tcp
740837454 | 2025-03-14T07:18:09.713427
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9190 /
tcp
1919228981 | 2025-03-05T00:22:46.018354
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
9193 /
tcp
15018106 | 2025-03-04T18:26:31.253539
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
9197 /
tcp
921225407 | 2025-03-06T01:21:01.105540
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9203 /
tcp
1911457608 | 2025-03-15T12:33:37.573047
\x00[\x00\x00\x00\x00\x00\x00
9211 /
tcp
740837454 | 2025-03-05T19:52:44.105983
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9214 /
tcp
-1888448627 | 2025-03-11T21:48:16.521099
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9244 /
tcp
-1399940268 | 2025-02-26T23:14:56.761806
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9257 /
tcp
1911457608 | 2025-03-07T08:23:00.223029
\x00[\x00\x00\x00\x00\x00\x00
9292 /
tcp
-1888448627 | 2025-03-13T21:03:18.016259
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9307 /
tcp
669849225 | 2025-03-09T21:27:56.346389
SSH-98.60-SysaxSSH_81885..42\r\n
9333 /
tcp
639175818 | 2025-03-06T00:12:20.010532
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
9398 /
tcp
-1036370807 | 2025-03-18T02:28:26.436091
-833168972 | 2025-03-12T18:38:44.766409
HTTP/1.1 200
Content-Type: text/html;charset=UTF-8
Transfer-Encoding: chunked
9444 /
tcp
1911457608 | 2025-03-22T16:20:27.606271
\x00[\x00\x00\x00\x00\x00\x00
9454 /
tcp
-1327660293 | 2025-03-23T15:43:25.146014
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9465 /
tcp
575925250 | 2025-03-07T03:19:26.336460
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
1282941221 | 2025-03-08T17:34:29.803987
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9510 /
tcp
1426971893 | 2025-02-25T05:47:18.298798
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
9527 /
tcp
1308377066 | 2025-03-16T04:55:02.467053
9530 /
tcp
-653033013 | 2025-03-22T17:15:20.983331
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
-2107996212 | 2025-03-04T21:34:35.423256
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9600 /
tcp
819727972 | 2025-03-12T05:30:20.896264
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9704 /
tcp
-585940771 | 2025-03-22T23:05:54.526305
9710 /
tcp
45131230 | 2025-02-23T05:46:00.708249
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
9861 /
tcp
-1399940268 | 2025-02-28T01:37:33.537029
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1867457549 | 2025-03-04T03:58:21.024630
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
9908 /
tcp
921225407 | 2025-03-17T04:47:58.836622
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9909 /
tcp
1989907056 | 2025-03-14T18:42:13.888306
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
9916 /
tcp
1492413928 | 2025-03-23T16:24:32.032439
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9922 /
tcp
819727972 | 2025-03-11T19:34:52.047447
SSH-2.0-OpenSSH_7.4
Vulnerabilities
56005235 | 2025-03-18T22:04:41.881114
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705935860.556-s5jhg
9944 /
tcp
1189133115 | 2025-03-18T05:32:23.759196
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
1969772007 | 2025-03-12T08:53:13.584177
HTTP/1.1 400 Bad Request
Connection: keep-alive
Connection: close
X-Via-JSL: c973153,-
X-Cache: error
9999 /
tcp
1161309183 | 2025-03-23T21:49:06.607764
10000 /
tcp
707919486 | 2025-03-13T02:50:33.458339
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
10001 /
tcp
1492413928 | 2025-03-12T23:57:17.066350
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10005 /
tcp
1911457608 | 2025-03-05T15:27:52.197945
\x00[\x00\x00\x00\x00\x00\x00
10012 /
tcp
-1380608668 | 2025-03-18T19:20:32.286557
\\x00[\'\\x1c\\xc0\\xa8X\\xfd
10026 /
tcp
-445721795 | 2025-02-23T19:43:11.032307
\x00[\xc3\xaed\x1a\x7f\x00\x00
10027 /
tcp
819727972 | 2025-03-22T07:52:31.072159
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10033 /
tcp
1574088840 | 2025-03-20T21:45:08.693803
">Application and Content Networking Software 3.9</a>)\n</BODY><
10045 /
tcp
-904840257 | 2025-03-11T21:48:35.733804
572 Relay not authorized\r\n
10050 /
tcp
660175493 | 2025-03-12T12:08:04.666521
10051 /
tcp
-2031152423 | 2025-03-15T02:28:50.677958
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
10052 /
tcp
-1399940268 | 2025-03-15T04:02:00.381817
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10081 /
tcp
819727972 | 2025-03-18T17:35:18.503633
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10083 /
tcp
1011407350 | 2025-02-28T11:35:00.774456
* OK GroupWise IMAP4rev1 Server Ready\r\n
10086 /
tcp
1919228981 | 2025-03-09T06:12:32.845603
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
10087 /
tcp
1989907056 | 2025-03-14T06:03:56.476943
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
10106 /
tcp
-2096652808 | 2025-03-22T05:10:42.109600
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10123 /
tcp
1911457608 | 2025-03-12T01:53:57.919931
\x00[\x00\x00\x00\x00\x00\x00
10134 /
tcp
-358801646 | 2025-03-14T09:03:27.108561
10250 /
tcp
-2096652808 | 2025-03-16T22:19:55.660653
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10324 /
tcp
321971019 | 2025-03-12T04:37:46.531652
-ERR client ip is not in whitelist\r
10397 /
tcp
921225407 | 2025-03-14T12:07:28.531532
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10399 /
tcp
945910976 | 2025-03-19T22:58:29.930995
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
10443 /
tcp
-1316491703 | 2025-03-19T09:30:30.191076
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
10554 /
tcp
-1105333987 | 2025-03-16T09:37:58.725109
10810 /
tcp
-1399940268 | 2025-03-18T23:38:41.989673
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10909 /
tcp
-1399940268 | 2025-03-23T19:30:50.892737
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10911 /
tcp
2063598737 | 2025-03-13T07:51:21.852940
11002 /
tcp
1642597142 | 2025-03-09T11:18:39.475795
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
11101 /
tcp
-1399940268 | 2025-03-06T18:59:42.359903
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11112 /
tcp
455076604 | 2025-03-22T13:53:10.592029
!\x07version\x04bind7 t{RPowerDNS Recursor 410
11210 /
tcp
-1888448627 | 2025-03-23T02:54:15.589485
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
11211 /
tcp
-136006866 | 2025-03-22T23:08:35.496365
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11288 /
tcp
1620329124 | 2025-03-13T20:05:26.822344
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
11300 /
tcp
307999478 | 2025-03-10T23:21:12.208039
unknown command \r\nunknown command \r\n
11601 /
tcp
-1114821551 | 2025-03-06T12:13:15.415184
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
227700176 | 2025-03-24T07:53:20.851854
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Cache-Control: no-store, no-transform
Set-Cookie: _csrf=kW6lEf7WlBTiDChV5oht1zfpUBE6MTcwNTkxMjc1NjU1NzkzNjYwNQ; Path=/; Expires=Tue, 23 Jan 2024 08:39:16 GMT; HttpOnly; SameSite=Lax
Set-Cookie: macaron_flash=; Path=/; Max-Age=0; HttpOnly; SameSite=Lax
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache
12107 /
tcp
-1428621233 | 2025-03-22T10:46:56.475819
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
12111 /
tcp
1911457608 | 2025-03-20T12:26:04.512978
\x00[\x00\x00\x00\x00\x00\x00
12112 /
tcp
1911457608 | 2025-03-20T06:23:30.668101
\x00[\x00\x00\x00\x00\x00\x00
12128 /
tcp
1370263973 | 2025-03-05T19:13:35.896619
12146 /
tcp
-2089734047 | 2025-03-19T20:03:12.236084
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12151 /
tcp
677934968 | 2025-03-12T22:19:27.969258
12155 /
tcp
1504401647 | 2025-03-12T13:39:13.614863
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
12175 /
tcp
1278527606 | 2025-02-24T22:32:05.611369
12181 /
tcp
921225407 | 2025-03-15T13:02:20.755003
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12188 /
tcp
-1399940268 | 2025-03-17T21:19:43.469043
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12193 /
tcp
-1399940268 | 2025-03-09T04:23:13.230592
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12204 /
tcp
-1888448627 | 2025-03-09T05:20:22.382626
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12213 /
tcp
921225407 | 2025-03-10T08:03:24.836742
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12231 /
tcp
819727972 | 2025-02-25T03:50:10.417278
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12235 /
tcp
740837454 | 2025-03-16T05:59:47.561626
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12240 /
tcp
-441419608 | 2025-03-13T12:45:56.183225
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
12251 /
tcp
819727972 | 2025-02-28T01:53:07.171430
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12264 /
tcp
819727972 | 2025-03-14T00:12:28.904102
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12271 /
tcp
-1888448627 | 2025-03-06T18:50:29.744338
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12290 /
tcp
-2089734047 | 2025-03-05T00:07:09.392329
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12301 /
tcp
-1399940268 | 2025-02-27T17:35:16.488570
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1748152518 | 2025-03-16T02:25:15.146673
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae26f8_hwt112_4105-46187
12362 /
tcp
165188539 | 2025-03-18T18:20:01.316401
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12380 /
tcp
-136006866 | 2025-03-13T10:46:38.298686
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
12385 /
tcp
408230060 | 2025-03-24T06:38:56.664515
\r\nSorry, that nickname format is invalid.\r\n
12395 /
tcp
-2089734047 | 2025-03-22T02:10:40.865932
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12396 /
tcp
1830187220 | 2025-03-08T21:33:45.707041
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
12397 /
tcp
819727972 | 2025-03-21T17:47:08.391722
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12414 /
tcp
455076604 | 2025-03-12T18:55:21.579528
!\x07version\x04bind7 t{RPowerDNS Recursor 410
12437 /
tcp
819727972 | 2025-03-19T05:21:47.900095
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12439 /
tcp
1519486042 | 2025-02-23T04:58:05.788875
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
12459 /
tcp
-454087041 | 2025-03-23T00:12:44.365738
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
12488 /
tcp
1504401647 | 2025-03-05T23:39:46.773415
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
12489 /
tcp
-585940771 | 2025-03-15T03:24:01.191358
12499 /
tcp
-1399940268 | 2025-03-05T15:01:28.706502
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12508 /
tcp
-2089734047 | 2025-02-26T04:08:26.389503
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12520 /
tcp
-2089734047 | 2025-03-14T23:16:40.633825
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12530 /
tcp
-2089734047 | 2025-03-08T18:42:07.589624
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12531 /
tcp
1308377066 | 2025-02-22T18:50:30.746553
12533 /
tcp
-1730858130 | 2025-03-12T01:05:34.906830
RFB 003.008
VNC:
Protocol Version: 3.8
12544 /
tcp
1911457608 | 2025-03-15T03:08:35.060224
\x00[\x00\x00\x00\x00\x00\x00
12559 /
tcp
921225407 | 2025-02-22T18:43:03.275360
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12566 /
tcp
1911457608 | 2025-03-22T11:53:28.852158
\x00[\x00\x00\x00\x00\x00\x00
12575 /
tcp
-2089734047 | 2025-03-17T21:10:08.326286
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12579 /
tcp
819727972 | 2025-03-18T15:57:07.859161
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12580 /
tcp
632542934 | 2025-02-22T21:02:20.238253
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12585 /
tcp
-2096652808 | 2025-03-18T23:54:13.463533
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12588 /
tcp
1989907056 | 2025-02-28T15:47:48.708703
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
13047 /
tcp
-358801646 | 2025-03-11T22:34:52.434336
13380 /
tcp
669849225 | 2025-03-23T21:38:43.934964
SSH-98.60-SysaxSSH_81885..42\r\n
14147 /
tcp
-1248408558 | 2025-03-22T18:09:58.551659
220 MikroTik FTP server (MikroTik 6.44.3) ready
14265 /
tcp
1911457608 | 2025-03-18T04:12:26.365380
\x00[\x00\x00\x00\x00\x00\x00
14895 /
tcp
-1730858130 | 2025-03-21T17:46:46.293549
RFB 003.008
VNC:
Protocol Version: 3.8
14896 /
tcp
-1297953727 | 2025-03-19T22:44:26.726179
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
14905 /
tcp
1996932384 | 2025-02-25T17:01:43.390244
15000 /
tcp
-1795027372 | 2025-03-06T15:50:53.917679
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
15038 /
tcp
165188539 | 2025-03-19T15:27:31.856527
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
15502 /
tcp
-1795027372 | 2025-03-19T07:49:14.050379
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
16005 /
tcp
-1399940268 | 2025-03-17T18:03:55.948711
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16020 /
tcp
1911457608 | 2025-03-17T08:39:07.639332
\x00[\x00\x00\x00\x00\x00\x00
16038 /
tcp
2098371729 | 2025-03-09T09:45:22.851152
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
16041 /
tcp
-1399940268 | 2025-03-21T05:19:42.062298
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16049 /
tcp
-1329831334 | 2025-03-22T15:41:44.183333
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
16061 /
tcp
1911457608 | 2025-03-24T05:43:50.815961
\x00[\x00\x00\x00\x00\x00\x00
16068 /
tcp
-1810987450 | 2025-03-19T17:11:44.591214
16084 /
tcp
1723769361 | 2025-03-13T18:00:28.213625
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
16089 /
tcp
-345718689 | 2025-03-16T18:13:40.184931
-2107996212 | 2025-03-05T06:15:04.623618
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
16097 /
tcp
575925250 | 2025-03-21T15:08:24.815087
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
16104 /
tcp
1911457608 | 2025-03-19T08:15:37.829286
\x00[\x00\x00\x00\x00\x00\x00
16464 /
tcp
-971970408 | 2025-03-21T00:19:40.305585
16993 /
tcp
-1032713145 | 2025-03-22T03:46:16.418965
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
17100 /
tcp
819727972 | 2025-02-28T16:44:50.748963
SSH-2.0-OpenSSH_7.4
Vulnerabilities
17774 /
tcp
-1399940268 | 2025-03-15T12:26:10.754996
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
17779 /
tcp
-1835475271 | 2025-03-07T12:33:50.976979
200 NOD32SS 99 (3318497116)\r\n
18005 /
tcp
-1399940268 | 2025-03-10T19:16:30.981508
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18017 /
tcp
1911457608 | 2025-03-18T17:56:07.183020
\x00[\x00\x00\x00\x00\x00\x00
18018 /
tcp
-1810987450 | 2025-03-22T09:36:15.986323
1830697416 | 2025-03-15T10:10:21.091920
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
18047 /
tcp
165188539 | 2025-03-06T22:12:14.439779
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18072 /
tcp
-1399940268 | 2025-03-15T15:52:26.937679
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18096 /
tcp
-1327660293 | 2025-03-23T17:54:53.370256
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
18443 /
tcp
-1099385124 | 2025-02-25T04:49:18.243902
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
19000 /
tcp
1126993057 | 2025-03-17T16:43:27.236288
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
19016 /
tcp
-1399940268 | 2025-03-10T23:25:39.079108
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19080 /
tcp
320677201 | 2025-03-17T20:28:42.521281
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
19930 /
tcp
2087396567 | 2025-03-14T10:37:52.843980
kjnkjabhbanc283ubcsbhdc72
19999 /
tcp
1726594447 | 2025-02-24T19:47:51.695329
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
1900503736 | 2025-03-20T20:02:50.654733
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20001 /
tcp
819727972 | 2025-03-20T10:32:14.034473
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20040 /
tcp
-1399940268 | 2025-02-24T21:44:17.330361
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20050 /
tcp
-1399940268 | 2025-03-01T01:24:42.388210
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20070 /
tcp
-1476017887 | 2025-03-21T19:28:35.833188
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
20110 /
tcp
51259122 | 2025-02-22T19:23:38.987677
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
20185 /
tcp
1624217396 | 2025-03-14T07:50:31.327641
HELO:10.3.6.0.false\nAS:2048\nHL:19
20256 /
tcp
-441419608 | 2025-03-08T13:44:28.563877
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
20547 /
tcp
2087396567 | 2025-03-23T23:59:37.606113
kjnkjabhbanc283ubcsbhdc72
20880 /
tcp
1370263973 | 2025-03-22T18:34:58.360923
21025 /
tcp
819727972 | 2025-02-26T21:03:13.033781
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21081 /
tcp
-1105333987 | 2025-03-15T08:40:20.041752
21100 /
tcp
-1032713145 | 2025-03-05T11:29:58.406743
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
21241 /
tcp
165188539 | 2025-03-13T07:52:57.671581
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21246 /
tcp
819727972 | 2025-03-06T17:11:43.411418
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21266 /
tcp
921225407 | 2025-03-15T22:29:50.621893
\x00\x00\x00\x04\x00\x00\x00\x00\x00
21267 /
tcp
-1375131644 | 2025-03-16T06:17:48.398217
\x00[v\xc3\xbdC\x7f\x00\x00
21269 /
tcp
-1730858130 | 2025-02-24T14:49:48.997602
RFB 003.008
VNC:
Protocol Version: 3.8
21275 /
tcp
1911457608 | 2025-03-12T13:46:54.391003
\x00[\x00\x00\x00\x00\x00\x00
21278 /
tcp
1655023012 | 2025-03-22T21:15:41.835205
athinfod: invalid query.\n
21279 /
tcp
1212285915 | 2025-03-16T15:26:14.387983
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
21281 /
tcp
1492413928 | 2025-03-06T14:35:05.205126
SSH-2.0-OpenSSH_7.5
Vulnerabilities
-1839934832 | 2025-03-14T05:27:26.522589
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
21303 /
tcp
366084633 | 2025-03-06T22:08:10.143663
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
21308 /
tcp
-1730858130 | 2025-03-07T01:58:44.942556
RFB 003.008
VNC:
Protocol Version: 3.8
-1453516345 | 2025-03-04T23:29:02.861213
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
21327 /
tcp
-297128567 | 2025-02-23T18:04:00.619887
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
21330 /
tcp
-1399940268 | 2025-03-04T03:00:10.829700
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21379 /
tcp
-1059554316 | 2025-03-12T13:29:12.051933
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
23023 /
tcp
-1114821551 | 2025-03-23T22:11:44.762587
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
23084 /
tcp
117101543 | 2025-03-14T02:43:41.675305
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
24245 /
tcp
1978059005 | 2025-03-14T13:23:28.474340
Sorry, that nickname format is invalid.
24442 /
tcp
103159425 | 2025-03-06T21:51:17.127090
24510 /
tcp
-1399940268 | 2025-03-17T21:03:39.909323
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25001 /
tcp
819727972 | 2025-03-21T01:53:07.389424
SSH-2.0-OpenSSH_7.4
Vulnerabilities
25008 /
tcp
1911457608 | 2025-02-22T21:03:27.333772
\x00[\x00\x00\x00\x00\x00\x00
25009 /
tcp
-441419608 | 2025-03-04T21:03:25.915020
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
25105 /
tcp
-1810987450 | 2025-03-22T20:24:22.151399
25565 /
tcp
1911457608 | 2025-03-19T19:18:27.717908
\x00[\x00\x00\x00\x00\x00\x00
26657 /
tcp
2087396567 | 2025-03-12T01:56:18.261059
kjnkjabhbanc283ubcsbhdc72
27015 /
tcp
1911457608 | 2025-03-18T04:02:24.624449
\x00[\x00\x00\x00\x00\x00\x00
27017 /
tcp
1763259671 | 2025-03-13T05:10:36.487599
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
27105 /
tcp
-1399940268 | 2025-03-17T13:05:08.950904
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
28015 /
tcp
-1947777893 | 2025-03-15T00:16:39.584609
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
30002 /
tcp
-1969169410 | 2025-03-23T15:42:12.416993
ÿû
-> GET / HTTP/1.0
GET / HTTP/1.0
undefined symbol: GET
->
->
30006 /
tcp
51259122 | 2025-03-04T06:12:22.868329
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
30008 /
tcp
1504401647 | 2025-03-13T07:01:58.389499
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
30009 /
tcp
-1996280214 | 2025-02-26T23:27:26.181148
30022 /
tcp
2087396567 | 2025-03-18T21:03:45.135292
kjnkjabhbanc283ubcsbhdc72
30023 /
tcp
1504401647 | 2025-02-28T12:04:35.151812
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
30025 /
tcp
165188539 | 2025-03-19T17:13:46.174826
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
30050 /
tcp
165188539 | 2025-02-23T21:02:10.556553
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
30122 /
tcp
1761482307 | 2025-03-18T17:14:05.394420
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
30303 /
tcp
1741579575 | 2025-03-19T21:39:55.769902
1282941221 | 2025-03-17T21:40:37.730364
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
30468 /
tcp
819727972 | 2025-03-17T08:30:55.540423
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30501 /
tcp
-1329831334 | 2025-03-18T19:00:28.527230
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
30718 /
tcp
67472471 | 2025-03-22T10:57:50.160263
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
30822 /
tcp
1208318993 | 2025-03-12T20:02:30.033526
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
31022 /
tcp
1741579575 | 2025-03-13T07:37:17.346634
31122 /
tcp
-441419608 | 2025-03-09T12:04:43.079973
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
31622 /
tcp
-1559123399 | 2025-03-23T09:24:34.713851
500 Permission denied - closing connection.
31722 /
tcp
660175493 | 2025-03-21T15:13:50.187312
31822 /
tcp
-971970408 | 2025-03-20T18:27:56.932285
32022 /
tcp
996960436 | 2025-03-23T18:38:45.021784
32122 /
tcp
1887224352 | 2025-03-20T02:56:23.618284
-1230049476 | 2025-03-23T16:55:49.533502
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
32303 /
tcp
321971019 | 2025-03-04T21:51:07.431989
-ERR client ip is not in whitelist\r
32322 /
tcp
722711397 | 2025-03-16T15:45:46.044811
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
32422 /
tcp
897328069 | 2025-03-09T15:32:03.388918
220 mail.scott000.com ESMTP
32444 /
tcp
-1399940268 | 2025-03-16T03:32:29.661546
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
32622 /
tcp
1308377066 | 2025-03-21T03:08:38.516447
32722 /
tcp
539065883 | 2025-03-23T05:22:20.184684
32764 /
tcp
-1648456501 | 2025-03-24T09:58:16.870746
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
33022 /
tcp
-971970408 | 2025-03-22T23:36:34.045290
33060 /
tcp
410249975 | 2025-03-22T18:13:17.583560
33122 /
tcp
-971970408 | 2025-03-04T14:15:43.729432
-288825733 | 2025-03-19T23:17:02.802531
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
1282941221 | 2025-03-24T07:01:27.948740
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
33422 /
tcp
2087396567 | 2025-03-19T17:12:03.876088
kjnkjabhbanc283ubcsbhdc72
33522 /
tcp
-441419608 | 2025-02-26T15:05:58.836180
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
33822 /
tcp
2087396567 | 2025-03-08T12:27:40.663519
kjnkjabhbanc283ubcsbhdc72
33922 /
tcp
2087396567 | 2025-03-18T01:58:08.025087
kjnkjabhbanc283ubcsbhdc72
34122 /
tcp
819727972 | 2025-03-20T15:18:23.458674
SSH-2.0-OpenSSH_7.4
Vulnerabilities
34322 /
tcp
171352214 | 2025-03-19T18:49:13.491864
-ERR client ip is not in whitelist
34522 /
tcp
422524323 | 2025-03-19T10:57:45.553033
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
34622 /
tcp
-952165951 | 2025-03-19T09:25:58.998709
34722 /
tcp
660175493 | 2025-03-03T23:29:22.351233
34822 /
tcp
-641479109 | 2025-03-19T05:51:18.087306
35000 /
tcp
-1399940268 | 2025-03-15T11:46:10.675277
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
35122 /
tcp
2067064333 | 2025-03-19T00:30:17.583556
35322 /
tcp
-358801646 | 2025-03-04T04:55:20.859084
35422 /
tcp
1690634669 | 2025-02-28T07:44:06.715932
-2107996212 | 2025-03-17T01:27:12.923599
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
35822 /
tcp
-2031152423 | 2025-03-17T18:36:07.932257
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
36022 /
tcp
1842524259 | 2025-03-17T20:42:17.582266
36222 /
tcp
671605376 | 2025-03-17T20:49:04.815358
36505 /
tcp
-1329831334 | 2025-03-14T16:17:46.754452
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
36522 /
tcp
-971970408 | 2025-02-28T20:12:46.526414
36622 /
tcp
1208318993 | 2025-02-27T10:59:27.540997
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
36722 /
tcp
-2017887953 | 2025-03-17T06:50:29.721605
SSH-2.0-OpenSSH_7.9
Vulnerabilities
36922 /
tcp
2087396567 | 2025-03-01T01:25:52.113403
kjnkjabhbanc283ubcsbhdc72
-1839934832 | 2025-03-16T22:50:27.805499
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
37215 /
tcp
841014058 | 2025-03-21T10:03:36.497390
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
37422 /
tcp
-1990350878 | 2025-02-28T18:23:57.699201
37522 /
tcp
819727972 | 2025-02-28T16:37:28.898274
SSH-2.0-OpenSSH_7.4
Vulnerabilities
37622 /
tcp
2087396567 | 2025-03-16T01:51:11.028502
kjnkjabhbanc283ubcsbhdc72
37777 /
tcp
-1399940268 | 2025-03-19T23:05:06.176499
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
37922 /
tcp
-1375131644 | 2025-03-18T00:07:18.372993
\x00[v\xc3\xbdC\x7f\x00\x00
2103111368 | 2025-02-27T12:41:25.835812
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
38122 /
tcp
-1428621233 | 2025-03-15T16:57:02.689071
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
38333 /
tcp
-1990350878 | 2025-03-15T21:07:00.743972
38722 /
tcp
2087396567 | 2025-03-13T21:37:56.999328
kjnkjabhbanc283ubcsbhdc72
38822 /
tcp
-971970408 | 2025-03-12T15:39:38.735394
38922 /
tcp
410249975 | 2025-03-13T16:14:13.040543
1282941221 | 2025-03-13T18:10:47.175129
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
39822 /
tcp
-1428621233 | 2025-03-12T07:10:56.570882
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
39922 /
tcp
-1529979118 | 2025-02-26T16:49:28.032902
40001 /
tcp
-1399940268 | 2025-03-12T00:09:45.000306
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
40322 /
tcp
-1189269828 | 2025-03-08T20:48:00.971739
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
40422 /
tcp
-2080784861 | 2025-03-09T04:48:56.081579
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
40471 /
tcp
580340387 | 2025-03-11T05:35:56.339696
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
41022 /
tcp
819727972 | 2025-03-08T22:33:17.968576
SSH-2.0-OpenSSH_7.4
Vulnerabilities
41122 /
tcp
-1730858130 | 2025-02-27T14:52:22.334288
RFB 003.008
VNC:
Protocol Version: 3.8
41222 /
tcp
1761482307 | 2025-03-05T00:20:19.095224
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
41794 /
tcp
660175493 | 2025-03-23T20:25:32.443567
41822 /
tcp
171352214 | 2025-03-07T17:19:34.986974
-ERR client ip is not in whitelist
41922 /
tcp
1741579575 | 2025-03-07T15:37:38.005029
42022 /
tcp
819727972 | 2025-03-04T15:34:08.917759
SSH-2.0-OpenSSH_7.4
Vulnerabilities
42222 /
tcp
-1730858130 | 2025-03-04T22:32:55.763972
RFB 003.008
VNC:
Protocol Version: 3.8
42424 /
tcp
-445721795 | 2025-03-16T21:48:58.644267
\x00[\xc3\xaed\x1a\x7f\x00\x00
43009 /
tcp
819727972 | 2025-03-12T14:40:47.734647
SSH-2.0-OpenSSH_7.4
Vulnerabilities
43200 /
tcp
1911457608 | 2025-03-19T21:09:08.856115
\x00[\x00\x00\x00\x00\x00\x00
43422 /
tcp
2087396567 | 2025-02-27T19:53:15.842390
kjnkjabhbanc283ubcsbhdc72
43622 /
tcp
2087396567 | 2025-02-26T23:40:12.798880
kjnkjabhbanc283ubcsbhdc72
43722 /
tcp
2087396567 | 2025-02-27T03:39:01.372228
kjnkjabhbanc283ubcsbhdc72
43822 /
tcp
-971970408 | 2025-02-27T01:22:15.219975
43922 /
tcp
-222277909 | 2025-02-27T09:40:10.389209
44345 /
tcp
740837454 | 2025-02-26T14:56:52.446908
SSH-2.0-OpenSSH_5.3
Vulnerabilities
44520 /
tcp
819727972 | 2025-02-28T17:36:50.522728
SSH-2.0-OpenSSH_7.4
Vulnerabilities
44522 /
tcp
-1111515360 | 2025-02-26T07:13:28.529111
remshd: Kerberos Authentication not enabled.
45001 /
tcp
820958131 | 2025-03-08T16:36:51.619897
kjnkjabhbanc283ubcsbhdc72\x02
45122 /
tcp
-438503381 | 2025-02-24T06:54:17.157952
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
45222 /
tcp
2087396567 | 2025-02-25T18:47:56.535615
kjnkjabhbanc283ubcsbhdc72
45667 /
tcp
-1399940268 | 2025-02-23T18:23:20.325744
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45677 /
tcp
1911457608 | 2025-03-06T04:09:49.887178
\x00[\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-03-11T23:08:22.976785
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
45922 /
tcp
89282912 | 2025-03-10T14:07:28.420817
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto
col:SOAP, MKSDisplayProtocol:VNC , ,
46000 /
tcp
-1888448627 | 2025-03-11T23:10:47.699185
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
46122 /
tcp
-314039103 | 2025-02-25T05:24:55.219028
Surnom.
Sorry, that nickname format is invalid.
46222 /
tcp
539065883 | 2025-02-24T22:27:11.498542
46422 /
tcp
2087396567 | 2025-02-24T08:38:08.259357
kjnkjabhbanc283ubcsbhdc72
46522 /
tcp
-1316491703 | 2025-02-24T06:03:23.203512
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
46822 /
tcp
-1626979812 | 2025-02-24T01:42:39.512110
220 Service ready for new user.
47080 /
tcp
-1730858130 | 2025-02-23T04:59:21.711307
RFB 003.008
VNC:
Protocol Version: 3.8
47122 /
tcp
1426971893 | 2025-02-23T22:13:12.961859
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
47222 /
tcp
1741579575 | 2025-02-23T21:06:23.376881
971933601 | 2025-02-23T18:44:08.268734
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
47522 /
tcp
660175493 | 2025-02-25T08:53:10.130653
47622 /
tcp
2087396567 | 2025-02-25T01:56:58.824925
kjnkjabhbanc283ubcsbhdc72
47722 /
tcp
-2096652808 | 2025-03-10T10:19:50.600439
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
47922 /
tcp
1741579575 | 2025-03-10T06:52:18.610177
47990 /
tcp
819727972 | 2025-02-24T17:27:25.015721
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48018 /
tcp
-1329831334 | 2025-03-18T01:55:00.207738
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
48019 /
tcp
165188539 | 2025-03-13T10:44:21.241631
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
48122 /
tcp
-1428621233 | 2025-03-10T05:19:39.344972
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
48222 /
tcp
1741579575 | 2025-03-10T03:25:05.040147
48522 /
tcp
-321444299 | 2025-03-09T23:46:40.670823
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
48722 /
tcp
-971970408 | 2025-02-24T15:27:04.534551
48822 /
tcp
819727972 | 2025-02-24T17:11:17.945706
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48899 /
tcp
1778988322 | 2025-03-22T05:21:26.722037
* OK GroupWise IMAP4rev1 Server Ready
148329221 | 2025-03-20T06:17:56.588932
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 03 Jan 2000 05:26:54 GMT
EXT:
SERVER: Linux/2.4.30, UPnP/1.0, Portable SDK for UPnP devices/1.3.1
X-User-Agent: redsonic
<s:Envelope
xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"
s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
<er
49222 /
tcp
119860953 | 2025-02-23T00:25:22.112269
* OK ArGoSoft Mail Server IMAP Module v.YW at
49822 /
tcp
-138733098 | 2025-02-22T20:02:50.358666
49922 /
tcp
-2031152423 | 2025-02-22T18:19:44.535471
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
50000 /
tcp
-21576419 | 2025-02-24T19:28:42.481059
ÿûUDo you want ANSI color? (Y/n)
50002 /
tcp
-1327660293 | 2025-02-28T02:31:48.214057
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
-147424911 | 2025-03-14T09:27:41.143482
HTTP/1.1 404 Not Found
Content Length: 0
50008 /
tcp
-1399940268 | 2025-02-28T18:27:27.615005
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50070 /
tcp
1690634669 | 2025-03-22T00:45:57.954785
50100 /
tcp
2087396567 | 2025-03-21T22:11:24.239123
kjnkjabhbanc283ubcsbhdc72
50103 /
tcp
819727972 | 2025-03-23T15:24:15.298485
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-03-17T04:05:12.487008
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
50112 /
tcp
-1733645023 | 2025-03-13T00:49:46.338147
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
50777 /
tcp
-2033111675 | 2025-03-22T19:34:46.014401
51004 /
tcp
1911457608 | 2025-02-27T06:17:42.908621
\x00[\x00\x00\x00\x00\x00\x00
51235 /
tcp
-1373613804 | 2025-03-21T16:56:17.115178
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
51443 /
tcp
-786044033 | 2025-03-12T00:09:55.211916
OK Welcome <299685> on DirectUpdate server 7286
52230 /
tcp
-1888448627 | 2025-02-23T21:34:40.581349
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
54984 /
tcp
2087396567 | 2025-03-21T06:35:44.987040
kjnkjabhbanc283ubcsbhdc72
55442 /
tcp
2087396567 | 2025-03-20T20:36:48.212243
kjnkjabhbanc283ubcsbhdc72
55443 /
tcp
-321444299 | 2025-03-12T02:58:00.679819
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
55481 /
tcp
-784071826 | 2025-03-04T09:39:28.790076
SSH-2.0-OpenSSH_8.0
Vulnerabilities
55553 /
tcp
-2031152423 | 2025-03-22T01:16:59.895201
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
55554 /
tcp
-984990168 | 2025-03-14T09:01:51.130244
55555 /
tcp
-1949170930 | 2025-03-23T00:07:36.551423
55822 /
tcp
-1559123399 | 2025-03-06T20:57:46.810155
500 Permission denied - closing connection.
57022 /
tcp
740837454 | 2025-03-06T14:00:09.915116
SSH-2.0-OpenSSH_5.3
Vulnerabilities
57781 /
tcp
921225407 | 2025-03-20T15:29:57.072829
\x00\x00\x00\x04\x00\x00\x00\x00\x00
57783 /
tcp
921225407 | 2025-03-18T02:44:03.057421
\x00\x00\x00\x04\x00\x00\x00\x00\x00
57784 /
tcp
-1399940268 | 2025-02-27T05:27:32.842501
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
58122 /
tcp
1082732927 | 2025-03-06T02:47:39.439278
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
58222 /
tcp
-1428621233 | 2025-03-06T01:25:01.619177
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
58378 /
tcp
-1248408558 | 2025-02-22T21:42:33.254155
220 MikroTik FTP server (MikroTik 6.44.3) ready
58585 /
tcp
-1399940268 | 2025-03-07T17:21:13.849419
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
58822 /
tcp
290819026 | 2025-03-05T18:48:11.435816
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
59222 /
tcp
171352214 | 2025-03-05T09:03:19.998500
-ERR client ip is not in whitelist
59322 /
tcp
-1114821551 | 2025-03-05T07:18:36.791903
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
60000 /
tcp
-1399940268 | 2025-03-15T18:46:56.220871
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
60129 /
tcp
1741579575 | 2025-03-19T06:39:26.396485
61613 /
tcp
1615193817 | 2025-03-20T04:55:51.836248
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
61616 /
tcp
671605376 | 2025-02-25T13:11:27.925288
62078 /
tcp
-860824904 | 2025-03-22T08:18:18.423664
63210 /
tcp
2071407588 | 2025-03-23T12:41:25.806898
63256 /
tcp
-653033013 | 2025-03-21T20:22:32.348874
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
63257 /
tcp
-641479109 | 2025-03-11T14:07:06.961526
1906191280 | 2025-03-15T21:50:47.173836
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 657d0443_jdx210_8928-57530
65004 /
tcp
921225407 | 2025-03-18T14:46:00.386994
\x00\x00\x00\x04\x00\x00\x00\x00\x00